Skip to main content

Security Bulletin

Filter by:

RISK: Medium Risk

Medium Risk

Xen Denial of Service Vulnerabilities

 Multiple vulnerabilities have been identified in Xen, which can be exploited by malicious HVM guest administors to cause a denial of services.
Last Update Date: 17 Nov 2015 09:50 Release Date: 17 Nov 2015 3361 Views

RISK: High Risk

High Risk

Google Chrome Multiple vulnerabilities

Multiple vulnerabilities in Google Chrome and Chrome OS. Exploitation of one of these vulnerabilities may allow a remote attacker to take control of an affected system.
Last Update Date: 12 Nov 2015 10:25 Release Date: 12 Nov 2015 3326 Views

RISK: Medium Risk

Medium Risk

Microsoft Skype for Business Server and Microsoft Lync Information Dislcosure Vulnerability

An information disclosure vulnerability exists when Skype for Business and Microsoft Lync clients improperly sanitize specially crafted content. An attacker who successfully exploited the vulnerability could execute HTML and JavaScript content in the Skype for Business or Lync context. The attacker could use this vulnerability to open a...
Last Update Date: 11 Nov 2015 16:51 Release Date: 11 Nov 2015 3414 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Kerberos Security Feature Bypass Vulnerability

A security feature bypass exists in Windows when Kerberos fails to check the password change of a user signing into a workstation. An attacker could bypass Kerberos authentication on a target machine and decrypt drives protected by BitLocker.
Last Update Date: 11 Nov 2015 16:50 Release Date: 11 Nov 2015 3527 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows IPSec Denial of Service Vulnerability

A denial of service vulnerability exists in Windows when the Internet Protocol Security (IPSec) service improperly handles encryption negotiation. An attacker who successfully exploited the vulnerability could cause the system to become nonresponsive.
Last Update Date: 11 Nov 2015 16:50 Release Date: 11 Nov 2015 3263 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Winsock Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists in Microsoft Windows when Winsock makes a call to a memory address without verifying that the address is valid. An attacker who successfully exploited this vulnerability could gain elevated privileges on a targeted system.
Last Update Date: 11 Nov 2015 16:49 Release Date: 11 Nov 2015 3333 Views

RISK: Medium Risk

Medium Risk

Microsoft .NET Framework Elevation of Privilege Vulnerabilities

.NET Information Disclosure VulnerabilityAn information disclosure vulnerability exists in the .NET Framework DTD parsing of certain specially crafted XML files. An attacker who successfully exploited this vulnerability could gain read access to local files on the target system. .NET Elevation of Privilege VulnerabilityAn elevation of privilege...
Last Update Date: 11 Nov 2015 16:49 Release Date: 11 Nov 2015 3365 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows NDIS Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists when NDIS fails to check the length of a buffer prior to copying memory into it. An attacker who successfully exploited this vulnerability could gain elevated privileges on a targeted system.
Last Update Date: 11 Nov 2015 16:48 Release Date: 11 Nov 2015 3285 Views

RISK: High Risk

High Risk

Microsoft Office Remote Code Execution Vulnerabilities

Multiple Microsoft Office Memory Corruption VulnerabilitiesMultiple remote code execution vulnerabilities exist in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. If the current user...
Last Update Date: 11 Nov 2015 16:48 Release Date: 11 Nov 2015 3280 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Remote Code Execution Vulnerabilities

Multiple Windows Kernel Memory Elevation of Privilege VulnerabilitiesMultiple elevation of privilege vulnerabilities exist in the way that Windows handles objects in memory. An attacker who successfully exploited the vulnerabilities could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or...
Last Update Date: 11 Nov 2015 16:47 Release Date: 11 Nov 2015 3278 Views